organizations, or recipients abroad, the SEC Office shall ensure that the destination agencies have sufficient security standards for personal data protection. 4. Retention and Retention Period of Personal Data
Management ■ 3. Mr. Vasant Thienhom Senior Assistant Secretary-General ■ 4. Cmdr. Anothai Khowlikhit R.N. Senior Division Chief Security Division 1 2 3 1 2 3 4 [ Executive Officers of the Office of the SEC ]13
client or beneficial owner. In case the client refused to give personal information or the information are substantially insufficient or not current, or there is https://publish.sec.or.th/nrs/6086pe.doc บท
of Commerce, Thai Institute of Directors, State Enterprise Policy Office in the Ministry of Finance, Federation of Accounting Professions, Social Security Office, Government Pension Fund, and
W20 (3) Educated the staff about IT security and the Computer Crime Act B.E.2550 (2007) as well as monitored their compliance with the IT security policy; (4) Improved the SEC's website (www.sec.or.th
Annual Report 2004 S h a p i n g t h e T h ai C a p i t a l M a r k e t A n n u a l R e p o r t 2 0 0 4 S E C U R I T I E S A N D E X C H A N G E C O M M I S S I O N , T H A I L A N D This year’s annual report features Benjarong ceramics. Benjarong, meaning five colours, gained popularity in the royal court and the high society of Siam in the late Ayudhya period (A.D. 1350 - 1767). But it was during the early Rattanakosin period (A.D. 1782 - present), in the reigns of King Rama II and King Rama...
Reform Priorities in Asia: Taking Corporate Governance to a Higher Level Taking Corporate Governance to a Higher Level reform priorities in Asia 2011 REFORM PRIORITIES IN ASIA: TAKING CORPORATE GOVERNANCE TO A HIGHER LEVEL 2011 This work is published on the responsibility of the Secretary-General of the OECD. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the Organisation or of the governments of its member countries. This document and any m...
of IT risks and risk mitigation policies, plans, and measures. For example, business continuity management, IT security, incident management, and IT asset management. (4) Proper allocation and https
) CGCodePart02_2 ) Consideration of IT risks and risk mitigation policies, plans, and measures. For example, business continuity management, IT security, incident management, and IT asset management. (4) Proper
expert to give opinions on the dispute. An expert shall be independent and have no personal interest with any party which may cause biased and unfair opinions. The arbitrator shall determine the expert’s